Journal articles on the topic 'Security devices'
Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles
Consult the top 50 journal articles for your research on the topic 'Security devices.'
Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.
You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.
Browse journal articles on a wide variety of disciplines and organise your bibliography correctly.
Al Reshan, Mana Saleh. "IoT-based Application of Information Security Triad." International Journal of Interactive Mobile Technologies (iJIM) 15, no. 24 (December 21, 2021): 61–76. http://dx.doi.org/10.3991/ijim.v15i24.27333.
Full textKroleski, Steven L., and William A. Bottiglieri. "Leases As Security Devices." Journal of Business Case Studies (JBCS) 4, no. 4 (June 28, 2011): 45. http://dx.doi.org/10.19030/jbcs.v4i4.4775.
Full textChoudhary, Yash, B. Umamaheswari, and Vijeta Kumawat. "A Study of Threats, Vulnerabilities and Countermeasures: An IoT Perspective." Shanlax International Journal of Arts, Science and Humanities 8, no. 4 (April 1, 2021): 39–45. http://dx.doi.org/10.34293/sijash.v8i4.3583.
Full textZhu, Li Jue, Wen Tao Zhao, Hui Jun Wu, Yong Liu, and Zhao Ming Hu. "Prototype Design of Self-Securing Portable Storage Device." Applied Mechanics and Materials 347-350 (August 2013): 3911–14. http://dx.doi.org/10.4028/www.scientific.net/amm.347-350.3911.
Full textKurt Peker, Yeṣem, Gabriel Bello, and Alfredo J. Perez. "On the Security of Bluetooth Low Energy in Two Consumer Wearable Heart Rate Monitors/Sensing Devices." Sensors 22, no. 3 (January 27, 2022): 988. http://dx.doi.org/10.3390/s22030988.
Full textMyridakis, Dimitrios, Georgios Spathoulas, Athanasios Kakarountas, and Dimitrios Schinianakis. "Smart Devices Security Enhancement via Power Supply Monitoring." Future Internet 12, no. 3 (March 10, 2020): 48. http://dx.doi.org/10.3390/fi12030048.
Full textKaushal, Rajesh Kumar, Naveen Kumar, Shilpi Singhal, Simranjeet Singh, and Harmaninderjit Singh. "Locking Device for Physical Protection of Electronic Devices." ECS Transactions 107, no. 1 (April 24, 2022): 1769–79. http://dx.doi.org/10.1149/10701.1769ecst.
Full textSharma, Amritesh Kumar, Arun Kumar Singh, and Pankaj P. Singh. "Security in Android." INTERNATIONAL JOURNAL OF COMPUTERS & TECHNOLOGY 12, no. 10 (April 25, 2014): 3990–96. http://dx.doi.org/10.24297/ijct.v12i10.2983.
Full textAlamer, A., and B. Soh. "FEATHER: A Proposed Lightweight Protocol for Mobile Cloud Computing Security." Engineering, Technology & Applied Science Research 10, no. 4 (August 16, 2020): 6116–25. http://dx.doi.org/10.48084/etasr.3676.
Full textA. Harris, Mark, and Karen P. Patten. "Mobile device security considerations for small- and medium-sized enterprise business mobility." Information Management & Computer Security 22, no. 1 (March 4, 2014): 97–114. http://dx.doi.org/10.1108/imcs-03-2013-0019.
Full textFoley, Patricia G., Kathleen Hargiss, Caroline Howard, and Anne Pesanvento. "Security Measures in IoT Devices, Including Wireless Medical Devices." International Journal of Cyber-Physical Systems 3, no. 1 (January 1, 2021): 25–36. http://dx.doi.org/10.4018/ijcps.2021010102.
Full textMtetwa, Njabulo Sakhile, Paul Tarwireyi, Cecilia Nombuso Sibeko, Adnan Abu-Mahfouz, and Matthew Adigun. "Blockchain-Based Security Model for LoRaWAN Firmware Updates." Journal of Sensor and Actuator Networks 11, no. 1 (January 7, 2022): 5. http://dx.doi.org/10.3390/jsan11010005.
Full textBuenrostro, Erick, Daniel Cyrus, Tra Le, and Vahid Emamian. "Security of IoT Devices." Journal of Cyber Security Technology 2, no. 1 (January 2, 2018): 1–13. http://dx.doi.org/10.1080/23742917.2018.1474592.
Full textGoto, Ren, Taiki Yoshikawa, Hijiri Komura, Kazushige Matama, Chihiro Nishiwaki, and Katsuhiro Naito. "Design and Basic Evaluation of Virtual IPv4-based CYPHONIC adapter." Journal of Systemics, Cybernetics and Informatics 20, no. 3 (June 2022): 55–63. http://dx.doi.org/10.54808/jsci.20.03.55.
Full textAlam, Tanweer, and Mohamed Benaida. "CICS: Cloud–Internet Communication Security Framework for the Internet of Smart Devices." International Journal of Interactive Mobile Technologies (iJIM) 12, no. 6 (October 29, 2018): 74. http://dx.doi.org/10.3991/ijim.v12i6.6776.
Full textZhu, Ruijin, Baofeng Zhang, Yu-an Tan, Jinmiao Wang, and Yueliang Wan. "Determining the Image Base of Smart Device Firmware for Security Analysis." Wireless Communications and Mobile Computing 2020 (December 22, 2020): 1–12. http://dx.doi.org/10.1155/2020/8899193.
Full textLima, António, Luis Rosa, Tiago Cruz, and Paulo Simões. "A Security Monitoring Framework for Mobile Devices." Electronics 9, no. 8 (July 25, 2020): 1197. http://dx.doi.org/10.3390/electronics9081197.
Full textSingh, Anuj Kumar, and B. D. K. Patro. "Security of Low Computing Power Devices: A Survey of Requirements, Challenges & Possible Solutions." Cybernetics and Information Technologies 19, no. 1 (March 1, 2019): 133–64. http://dx.doi.org/10.2478/cait-2019-0008.
Full textNemec Zlatolas, Lili, Nataša Feher, and Marko Hölbl. "Security Perception of IoT Devices in Smart Homes." Journal of Cybersecurity and Privacy 2, no. 1 (February 14, 2022): 65–74. http://dx.doi.org/10.3390/jcp2010005.
Full textJiang, Dawei, and Guoquan Shi. "Research on Data Security and Privacy Protection of Wearable Equipment in Healthcare." Journal of Healthcare Engineering 2021 (February 5, 2021): 1–7. http://dx.doi.org/10.1155/2021/6656204.
Full textAl_Dosary, Duaa, Khattab M. Ali Alheeti, and Salah Sleibi Al-Rawi. "ICMetric Security System for Achieving Embedded Devices Security." Journal of Physics: Conference Series 1804, no. 1 (February 1, 2021): 012102. http://dx.doi.org/10.1088/1742-6596/1804/1/012102.
Full textMatheu, Sara N., Alberto Robles Enciso, Alejandro Molina Zarca, Dan Garcia-Carrillo, José Luis Hernández-Ramos, Jorge Bernal Bernabe, and Antonio F. Skarmeta. "Security Architecture for Defining and Enforcing Security Profiles in DLT/SDN-Based IoT Systems." Sensors 20, no. 7 (March 28, 2020): 1882. http://dx.doi.org/10.3390/s20071882.
Full textWang, Lei, Yalong Li, Xinyuan Tian, and Deyun Mo. "A design of the lightweight key management system for multi-level embedded devices." Applied Mathematics and Nonlinear Sciences 7, no. 2 (July 1, 2022): 1093–104. http://dx.doi.org/10.2478/amns.2021.2.00319.
Full textToka, K. O., Y. Dikilitaş, T. Oktay, and A. Sayar. "SECURING IOT WITH BLOCKCHAIN." International Archives of the Photogrammetry, Remote Sensing and Spatial Information Sciences XLVI-4/W5-2021 (December 23, 2021): 529–32. http://dx.doi.org/10.5194/isprs-archives-xlvi-4-w5-2021-529-2021.
Full textSinda, Matt, Tyler Danner, Sean O'Neill, Abeer Alqurashi, and Haeng-Kon Kim. "Improving the Bluetooth Hopping Sequence for Better Security in IoT Devices." International Journal of Software Innovation 6, no. 4 (October 2018): 117–31. http://dx.doi.org/10.4018/ijsi.2018100109.
Full textChang, Milton, Santanu Das, Dale Montrone, and Tapan Chakraborty. "Systems for Implementing Data Communication with Security Tokens." International Journal of High Speed Electronics and Systems 29, no. 01n04 (March 2020): 2040012. http://dx.doi.org/10.1142/s0129156420400121.
Full textM G, Padmashree, Mallikarjun J P, Arunalatha J S, and Venugopal K R. "MEKDA: Multi-Level ECC based Key Distribution and Authentication in Internet of Things." International journal of Computer Networks & Communications 13, no. 6 (September 30, 2021): 19–39. http://dx.doi.org/10.5121/ijcnc.2021.13602.
Full textOser, Pascal, Rens W. van der Heijden, Stefan Lüders, and Frank Kargl. "Risk Prediction of IoT Devices Based on Vulnerability Analysis." ACM Transactions on Privacy and Security 25, no. 2 (May 31, 2022): 1–36. http://dx.doi.org/10.1145/3510360.
Full textZeng, Wen Ying, and Yue Long Zhao. "Mobile Storage and Data Security Management Research." Applied Mechanics and Materials 325-326 (June 2013): 1661–64. http://dx.doi.org/10.4028/www.scientific.net/amm.325-326.1661.
Full textThoutam, Vivek. "Unique Security Challenges of Iot Devices and Spectrum of Security Considerations." International Journal of Information technology and Computer Engineering, no. 11 (September 30, 2021): 15–21. http://dx.doi.org/10.55529/ijitc.11.15.21.
Full textThoutam, Vivek. "Unique Security Challenges Of Iot Devices And Spectrum Of Security Considerations." Journal of Artificial Intelligence, Machine Learning and Neural Network, no. 12 (November 12, 2021): 1–7. http://dx.doi.org/10.55529/jaimlnn.12.1.7.
Full textChiasson, Sonia, Heather Crawford, Serge Egelman, and Pourang Irani. "Reflections on U-PriSM 2." International Journal of Mobile Human Computer Interaction 6, no. 2 (April 2014): 73–78. http://dx.doi.org/10.4018/ijmhci.2014040106.
Full textKodati, Sarangam, Kumbala Pradeep Reddy, Thotakura Veerananna, S. Govinda Rao, and G. Anil Kumar. "Security Framework Connection Assistance for IoT Device Secure Data communication." E3S Web of Conferences 309 (2021): 01061. http://dx.doi.org/10.1051/e3sconf/202130901061.
Full textWakabayashi, Kiyoshi, Hiroyuki Kikuchi, Toshihiro Mori, Takamitsu Okada, and Yoshiro Koyama. "Safety Devices for Security Robots." Journal of the Robotics Society of Japan 29, no. 9 (2011): 777–79. http://dx.doi.org/10.7210/jrsj.29.777.
Full textHarthorne, J. Warren. "Pacemakers and Store Security Devices." Cardiology in Review 9, no. 1 (January 2001): 10–17. http://dx.doi.org/10.1097/00045415-200101000-00004.
Full textP.Musale, Vinayak, and S. S. Apte. "Security Risks in Bluetooth Devices." International Journal of Computer Applications 51, no. 1 (August 30, 2012): 1–6. http://dx.doi.org/10.5120/8003-1308.
Full textSametinger, Johannes, Jerzy Rozenblit, Roman Lysecky, and Peter Ott. "Security challenges for medical devices." Communications of the ACM 58, no. 4 (March 23, 2015): 74–82. http://dx.doi.org/10.1145/2667218.
Full textNeves, Ulysses Moreira, and Flávio Luis de Mello. "BYOD with Security." Journal of Information Security and Cryptography (Enigma) 5, no. 1 (January 27, 2019): 40. http://dx.doi.org/10.17648/jisc.v5i1.70.
Full textNtwari, Richard, Annabella E. Habinka, and Fred Kaggwa. "Enhancing Bring Your Own Device Security in Education." Journal of Science & Technology 02, no. 04 (2021): 69–86. http://dx.doi.org/10.55662/jst.2021.2401.
Full textJ G, Krithick, Nivedh T S, Siva Bharath S, Dr Radhamani A. S, and V. Ramanathan. "DATA SECURITY IN HEALTHCARE USING IOT." International Journal of Engineering Applied Sciences and Technology 7, no. 3 (July 1, 2022): 79–82. http://dx.doi.org/10.33564/ijeast.2022.v07i03.011.
Full textHewitt, Barbara, and Garry White. "Factors Influencing Security Incidents on Personal Computing Devices." Journal of Organizational and End User Computing 33, no. 4 (July 2021): 185–208. http://dx.doi.org/10.4018/joeuc.20210701.oa9.
Full textSu, Xin, Ziyu Wang, Xiaofeng Liu, Chang Choi, and Dongmin Choi. "Study to Improve Security for IoT Smart Device Controller: Drawbacks and Countermeasures." Security and Communication Networks 2018 (May 31, 2018): 1–14. http://dx.doi.org/10.1155/2018/4296934.
Full textKim, Jiyeon, Minsun Shim, Seungah Hong, Yulim Shin, and Eunjung Choi. "Intelligent Detection of IoT Botnets Using Machine Learning and Deep Learning." Applied Sciences 10, no. 19 (October 8, 2020): 7009. http://dx.doi.org/10.3390/app10197009.
Full textWang, Jin, Chang Liu, Jiangpei Xu, Juan Wang, Shirong Hao, Wenzhe Yi, and Jing Zhong. "IoT-DeepSense: Behavioral Security Detection of IoT Devices Based on Firmware Virtualization and Deep Learning." Security and Communication Networks 2022 (March 18, 2022): 1–17. http://dx.doi.org/10.1155/2022/1443978.
Full textChoi, Ye-Jin, Hee-Jung Kang, and Il-Gu Lee. "Scalable and Secure Internet of Things Connectivity." Electronics 8, no. 7 (July 3, 2019): 752. http://dx.doi.org/10.3390/electronics8070752.
Full textZendehdel, Ghazale Amel, Ratinder Kaur, Inderpreet Chopra, Natalia Stakhanova, and Erik Scheme. "Automated Security Assessment Framework for Wearable BLE-enabled Health Monitoring Devices." ACM Transactions on Internet Technology 22, no. 1 (February 28, 2022): 1–31. http://dx.doi.org/10.1145/3448649.
Full textLopes, Ana Paula G., and Paulo R. L. Gondim. "Low-Cost Authentication Protocol for D2D Communication in m-Health with Trust Evaluation." Wireless Communications and Mobile Computing 2020 (October 27, 2020): 1–16. http://dx.doi.org/10.1155/2020/8876807.
Full textRajendran, Jeyavijayan, Ramesh Karri, James B. Wendt, Miodrag Potkonjak, Nathan McDonald, Garrett S. Rose, and Bryant Wysocki. "Nano Meets Security: Exploring Nanoelectronic Devices for Security Applications." Proceedings of the IEEE 103, no. 5 (May 2015): 829–49. http://dx.doi.org/10.1109/jproc.2014.2387353.
Full textDutta-Roy, Amitava. "Nano meets security: Exploring nanoelectronic devices for security applications." Proceedings of the IEEE 103, no. 5 (May 2015): 822–28. http://dx.doi.org/10.1109/jproc.2015.2418512.
Full textSolera-Cotanilla, Sonia, Mario Vega-Barbas, Jaime Pérez, Gregorio López, Javier Matanza, and Manuel Álvarez-Campana. "Security and Privacy Analysis of Youth-Oriented Connected Devices." Sensors 22, no. 11 (May 24, 2022): 3967. http://dx.doi.org/10.3390/s22113967.
Full text